menu
QAmmunity.org
Recent questions in Computers and Technology
Login
Register
My account
Edit my Profile
Private messages
My favorites
Recent questions in Computers and Technology
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Recent questions in Computers and Technology
Which statement is true about using material from a site such as Wikipedia using a Creative Commons License? 1) The material can be used for any purpose without attribution 2) The material can be used
RonTheOld
asked
Oct 8, 2024
by
RonTheOld
8.5k
points
Computers and Technology
high-school
1
answer
3
votes
102k
views
(T or F) Downloading games from unknown websites can be risky. The software may be a Trojan horse
Lkaf Temravet
asked
Oct 8, 2024
by
Lkaf Temravet
7.0k
points
Computers and Technology
high-school
1
answer
5
votes
147k
views
Which of the following is a major benefit of object-oriented programming? A) The development of logical steps to achieve the object of the program B) The use of subroutines that optimize the program's
Czerasz
asked
Oct 8, 2024
by
Czerasz
7.2k
points
Computers and Technology
high-school
1
answer
0
votes
103k
views
Characters that modify a device's behavior rather than representing text are known as ___________.
Sambi Reddy
asked
Oct 8, 2024
by
Sambi Reddy
8.1k
points
Computers and Technology
college
2
answers
0
votes
164k
views
Can you Teach in Texas Without a Teaching certificate?
All Jazz
asked
Oct 8, 2024
by
All Jazz
7.7k
points
Computers and Technology
high-school
1
answer
3
votes
110k
views
True or false You do not need to install a web application to your computer; it would be accessed via a browser.
Eldad Assis
asked
Oct 8, 2024
by
Eldad Assis
7.6k
points
Computers and Technology
high-school
1
answer
3
votes
51.0k
views
An unsafe state is one in which there is at least one sequence of resource allocations to processes that does not result in a deadlock.
Landys
asked
Oct 8, 2024
by
Landys
8.7k
points
Computers and Technology
high-school
1
answer
4
votes
150k
views
Can you connect a SIM card to a computer?
Daniel Poulsen
asked
Oct 8, 2024
by
Daniel Poulsen
7.6k
points
Computers and Technology
high-school
1
answer
3
votes
218k
views
Give the steps you would use to find and replace the occurrence of a particular word in Microsoft Word.
ReedD
asked
Oct 8, 2024
by
ReedD
8.3k
points
Computers and Technology
high-school
1
answer
2
votes
115k
views
In the affine cipher, how do you decrypt the ciphertext, and what does a^-1 mean in the encryption formula? A) Decrypt by reversing the operations. B) Decrypt by using the multiplicative inverse. C) Decrypt
Peter Lustig
asked
Oct 8, 2024
by
Peter Lustig
7.9k
points
Computers and Technology
high-school
1
answer
5
votes
221k
views
What guidelines should you keep in mind as you interact and communicate with fellow staffers?
Brian G
asked
Oct 8, 2024
by
Brian G
8.3k
points
Computers and Technology
high-school
1
answer
1
vote
37.9k
views
What is another name for HD? How was this derived?
Johan De Haan
asked
Oct 8, 2024
by
Johan De Haan
8.2k
points
Computers and Technology
high-school
1
answer
1
vote
22.3k
views
What are the options available for applying Windows updates to a new Nano Server image and an existing Nano Server image?
Sathed
asked
Oct 8, 2024
by
Sathed
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
166k
views
Which of the following would be most likely an atomic(simple) attribute type? 1. Age. 2. Employee ID. 3. Phone Number. 4. Social Security Number. 5. Date of Birth 6. Gender.
Lucasweb
asked
Oct 8, 2024
by
Lucasweb
8.2k
points
Computers and Technology
high-school
1
answer
4
votes
102k
views
What is the primary purpose of charts in a medical setting? A) Displaying hospital statistics B) Recording patient treatment on specific dates C) Creating visual art for the facility D) Documenting staff
Maricela
asked
Oct 8, 2024
by
Maricela
8.2k
points
Computers and Technology
high-school
1
answer
2
votes
210k
views
What does the National Security Agency (NSA) use to collect data on U.S. citizens? A. PRISM B. Social credit C. Skynet D. TikTok
Etienne Dijon
asked
Oct 8, 2024
by
Etienne Dijon
7.8k
points
Computers and Technology
college
1
answer
1
vote
143k
views
Michelle has a security token that her company issued to her. What type of authentication factor does she have? A. Biometric B. Possession C. Knowledge D. Inherence
Hnroot
asked
Oct 8, 2024
by
Hnroot
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
134k
views
you work at a computer repair store. a customer reports that his computer will not boot to windows. you suspect that one or more memory modules might not be working. you've observed that four 2-gb memory
ChrisJP
asked
Oct 8, 2024
by
ChrisJP
8.3k
points
Computers and Technology
high-school
1
answer
0
votes
18.8k
views
The ATM belong to which type of real-time systems? A. Hard real-time systems B. Soft real-time systems C. In-house real-time systems. D. Build-in real-time systems
Podo
asked
Oct 8, 2024
by
Podo
7.6k
points
Computers and Technology
high-school
1
answer
5
votes
132k
views
While scanning, you decide to increase the image contrast to produce a more black and white image. What console control will be adjusted? A) Increase overall gain B) Increase rejection C) Reduce demodulation
Altan
asked
Oct 8, 2024
by
Altan
8.5k
points
Computers and Technology
high-school
1
answer
1
vote
136k
views
Page:
« prev
1
...
969
970
971
972
973
974
975
...
1000
...
next »
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
How do you can you solve this problem 37 + y = 87; y =
What is .725 as a fraction
is it true or false that after the american revolution conflicts in the northwest territory erupted between remaining british soldiers and native americans
Who made dutch claims in north america?
How did world war 1 affect the racial and ethnic makeup of american cities
Search QAmmunity.org